Skip to Content

3 Results Found

  • Article
  • Open Access
1 Citations
4,366 Views
15 Pages

5 December 2019

Designing a secure construction has always been a fascinating area for the researchers in the field of symmetric key cryptography. This research aimed to make contributions to the design of secure block cipher in the ideal cipher model whose underlyi...

  • Article
  • Open Access
1 Citations
7,048 Views
22 Pages

A technique of authenticated encryption for memory constrained devices called sp-AELM was proposed by Agrawal et al. at ACISP 2015. The sp-ALEM construction utilizes a sponge-based primitive to support online encryption and decryption functionalities...